BRPI0920054A2 - safe mode execution of plug-ins - Google Patents
safe mode execution of plug-insInfo
- Publication number
- BRPI0920054A2 BRPI0920054A2 BRPI0920054A BRPI0920054A BRPI0920054A2 BR PI0920054 A2 BRPI0920054 A2 BR PI0920054A2 BR PI0920054 A BRPI0920054 A BR PI0920054A BR PI0920054 A BRPI0920054 A BR PI0920054A BR PI0920054 A2 BRPI0920054 A2 BR PI0920054A2
- Authority
- BR
- Brazil
- Prior art keywords
- ins
- plug
- safe mode
- mode execution
- execution
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
- G06F15/161—Computing infrastructure, e.g. computer clusters, blade chassis or hardware partitioning
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
- G06F15/163—Interprocessor communication
- G06F15/167—Interprocessor communication using a common memory, e.g. mailbox
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformation of program code
- G06F8/41—Compilation
- G06F8/44—Encoding
- G06F8/443—Optimisation
- G06F8/4441—Reducing the execution time required by the program code
- G06F8/4442—Reducing the number of cache misses; Data prefetching
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30003—Arrangements for executing specific machine instructions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Debugging And Monitoring (AREA)
- Stored Programmes (AREA)
- Information Transfer Between Computers (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US12/326,114 US8745361B2 (en) | 2008-12-02 | 2008-12-02 | Sandboxed execution of plug-ins |
| PCT/US2009/062922 WO2010065222A1 (en) | 2008-12-02 | 2009-11-02 | Sandboxed execution of plug-ins |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| BRPI0920054A2 true BRPI0920054A2 (en) | 2015-12-15 |
Family
ID=42223846
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| BRPI0920054A BRPI0920054A2 (en) | 2008-12-02 | 2009-11-02 | safe mode execution of plug-ins |
Country Status (12)
| Country | Link |
|---|---|
| US (3) | US8745361B2 (en) |
| EP (1) | EP2356578A4 (en) |
| JP (1) | JP2012510679A (en) |
| KR (1) | KR101652135B1 (en) |
| CN (1) | CN102232217B (en) |
| AU (1) | AU2009322881B2 (en) |
| BR (1) | BRPI0920054A2 (en) |
| CA (1) | CA2742121A1 (en) |
| IL (1) | IL212332A0 (en) |
| MX (1) | MX2011005834A (en) |
| RU (1) | RU2011122280A (en) |
| WO (1) | WO2010065222A1 (en) |
Families Citing this family (75)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9418040B2 (en) * | 2005-07-07 | 2016-08-16 | Sciencelogic, Inc. | Dynamically deployable self configuring distributed network management system |
| US8856782B2 (en) | 2007-03-01 | 2014-10-07 | George Mason Research Foundation, Inc. | On-demand disposable virtual work system |
| US9176754B2 (en) * | 2008-07-16 | 2015-11-03 | Google Inc. | Method and system for executing applications using native code modules |
| US9098698B2 (en) * | 2008-09-12 | 2015-08-04 | George Mason Research Foundation, Inc. | Methods and apparatus for application isolation |
| US8745361B2 (en) | 2008-12-02 | 2014-06-03 | Microsoft Corporation | Sandboxed execution of plug-ins |
| FR2940695B1 (en) * | 2008-12-30 | 2012-04-20 | Eads Secure Networks | MICRONOYAU GATEWAY SERVER |
| CN101510167B (en) * | 2009-03-31 | 2016-04-20 | 阿里巴巴集团控股有限公司 | A kind of method of plug-in component operation, Apparatus and system |
| US9762701B1 (en) * | 2009-04-10 | 2017-09-12 | Open Invention Network Llc | System and method for cached streaming application isolation |
| US8839422B2 (en) * | 2009-06-30 | 2014-09-16 | George Mason Research Foundation, Inc. | Virtual browsing environment |
| US20110154214A1 (en) * | 2009-12-18 | 2011-06-23 | Microsoft Corporation | Offloading Content Retrieval And Decoding In Pluggable Content-Handling Systems |
| US9009697B2 (en) | 2011-02-08 | 2015-04-14 | International Business Machines Corporation | Hybrid cloud integrator |
| US9063789B2 (en) | 2011-02-08 | 2015-06-23 | International Business Machines Corporation | Hybrid cloud integrator plug-in components |
| US9104672B2 (en) * | 2011-02-25 | 2015-08-11 | International Business Machines Corporation | Virtual security zones for data processing environments |
| US9053580B2 (en) | 2011-02-25 | 2015-06-09 | International Business Machines Corporation | Data processing environment integration control interface |
| US8988998B2 (en) | 2011-02-25 | 2015-03-24 | International Business Machines Corporation | Data processing environment integration control |
| US9128773B2 (en) | 2011-02-25 | 2015-09-08 | International Business Machines Corporation | Data processing environment event correlation |
| CN103942488B (en) * | 2011-04-21 | 2017-06-23 | 北京奇虎科技有限公司 | Method, device and the secure browser being on the defensive using sandbox technology |
| CN103514401A (en) * | 2011-04-21 | 2014-01-15 | 北京奇虎科技有限公司 | Method and device for defense by utilization of sandbox technology and security browser |
| CN102184356B (en) * | 2011-04-21 | 2014-04-02 | 奇智软件(北京)有限公司 | Method, device and safe browser using sandbox technology for defense |
| US20130167028A1 (en) * | 2011-06-01 | 2013-06-27 | Adobe Systems Incorporated | Restricting media content rendering |
| US8973158B2 (en) | 2011-07-20 | 2015-03-03 | Microsoft Technology Licensing Llc | Trust level activation |
| WO2013082437A1 (en) | 2011-12-02 | 2013-06-06 | Invincia, Inc. | Methods and apparatus for control and detection of malicious content using a sandbox environment |
| CN104021167B (en) * | 2011-12-28 | 2017-06-16 | 北京奇虎科技有限公司 | A kind of method and device for browsing webpage |
| CN102436507B (en) * | 2011-12-28 | 2014-07-16 | 奇智软件(北京)有限公司 | Method and device for browsing web pages |
| CN104021168B (en) * | 2011-12-28 | 2017-06-16 | 北京奇虎科技有限公司 | A kind of method and device for browsing webpage |
| US9336061B2 (en) | 2012-01-14 | 2016-05-10 | International Business Machines Corporation | Integrated metering of service usage for hybrid clouds |
| US8799988B2 (en) * | 2012-01-25 | 2014-08-05 | Microsoft Corporation | Document communication runtime interfaces |
| CN102622439B (en) * | 2012-03-06 | 2014-06-11 | 北京奇虎科技有限公司 | Method and device for displaying document in browser |
| CN103955468B (en) * | 2012-03-06 | 2017-12-19 | 北京奇虎科技有限公司 | Document display method and device based on browser |
| CN102663283B (en) * | 2012-03-20 | 2016-02-10 | 浪潮电子信息产业股份有限公司 | A kind of method of dynamic isolation computer system |
| US9626710B1 (en) | 2012-05-23 | 2017-04-18 | Amazon Technologies, Inc. | Best practice analysis, optimized resource use |
| US10740765B1 (en) | 2012-05-23 | 2020-08-11 | Amazon Technologies, Inc. | Best practice analysis as a service |
| US9219648B1 (en) | 2012-05-23 | 2015-12-22 | Amazon Technologies, Inc. | Best practice analysis, automatic remediation |
| US8769059B1 (en) * | 2012-05-23 | 2014-07-01 | Amazon Technologies, Inc. | Best practice analysis, third-party plug-ins |
| US9003479B2 (en) * | 2012-12-11 | 2015-04-07 | International Business Machines Corporation | Uniformly transforming the characteristics of a production environment |
| CN102982169B (en) * | 2012-12-12 | 2017-05-24 | 北京奇虎科技有限公司 | Browser and method for isolating webpage plugins |
| US9197446B2 (en) * | 2012-12-12 | 2015-11-24 | Google Inc. | Address pinning |
| CN103064709B (en) * | 2012-12-25 | 2016-11-09 | 北京奇虎科技有限公司 | Execution method, system and browser of browser active object |
| US9740390B2 (en) * | 2013-03-11 | 2017-08-22 | Spikes, Inc. | Dynamic clip analysis |
| CN104063284B (en) * | 2013-03-18 | 2016-07-06 | 腾讯科技(深圳)有限公司 | The method and apparatus running application program |
| WO2014188492A1 (en) * | 2013-05-20 | 2014-11-27 | 三菱電機株式会社 | Monitoring control device |
| US9292525B2 (en) * | 2013-06-19 | 2016-03-22 | BlackBerry Limited; 2236008 Ontario Inc. | Searching data using pre-prepared search data |
| CN103617092A (en) * | 2013-11-21 | 2014-03-05 | 北京奇虎科技有限公司 | Browser based plug-in running method and device |
| US9697374B2 (en) * | 2014-02-19 | 2017-07-04 | Microsoft Technology Licensing, Llc | Data proxy service |
| US9563488B2 (en) * | 2014-05-29 | 2017-02-07 | Apple Inc. | Sharing extension points to allow an application to share content via a sharing extension |
| CN104536776B (en) * | 2014-11-28 | 2018-11-23 | 百度在线网络技术(北京)有限公司 | A kind of method and apparatus running plug-in application in the plug-in component operation environment of host end |
| WO2016106510A1 (en) * | 2014-12-29 | 2016-07-07 | 华为技术有限公司 | Security protection method and device |
| US10230750B2 (en) * | 2015-06-08 | 2019-03-12 | Securboration, Inc. | Secure computing environment |
| RU2618947C2 (en) * | 2015-06-30 | 2017-05-11 | Закрытое акционерное общество "Лаборатория Касперского" | Method of preventing program operation comprising functional undesirable for user |
| US11637866B2 (en) * | 2015-10-28 | 2023-04-25 | Qomplx, Inc. | System and method for the secure evaluation of cyber detection products |
| US10021120B1 (en) | 2015-11-09 | 2018-07-10 | 8X8, Inc. | Delayed replication for protection of replicated databases |
| CN105302563B (en) * | 2015-11-09 | 2019-09-17 | 歌尔股份有限公司 | The plug-in unit method and system of mobile application service |
| CN105760755B (en) * | 2016-02-24 | 2018-06-19 | 浪潮通用软件有限公司 | Isolation method of Visual Studio extension packet |
| US9665714B1 (en) * | 2016-05-31 | 2017-05-30 | AO Kaspersky Lab | System and method of detecting malicious files on virtual machines in a distributed network |
| RU2638000C1 (en) * | 2017-02-08 | 2017-12-08 | Акционерное общество "Лаборатория Касперского" | Method of monitoring execution system of programmable logic controller |
| US11423140B1 (en) * | 2017-03-27 | 2022-08-23 | Melih Abdulhayoglu | Auto-containment of guest user applications |
| US10951644B1 (en) | 2017-04-07 | 2021-03-16 | Comodo Security Solutions, Inc. | Auto-containment of potentially vulnerable applications |
| US20190138712A1 (en) * | 2017-05-31 | 2019-05-09 | Adnomus, Inc. | Systems and methods for real-time data processing analytics engine with adaptive component services |
| CN107395650B (en) * | 2017-09-07 | 2020-06-09 | 杭州安恒信息技术股份有限公司 | Method and device for identifying Trojan back connection based on sandbox detection file |
| CN107968721B (en) * | 2017-11-02 | 2020-09-11 | 江苏神州信源系统工程有限公司 | Method for actively releasing server, network management and control system and managed and controlled terminal |
| TWI683264B (en) * | 2017-11-23 | 2020-01-21 | 兆豐國際商業銀行股份有限公司 | Monitoring management system and method for synchronizing message definition file |
| CN108647513B (en) * | 2018-03-22 | 2020-04-28 | 华中科技大学 | TrustZone-based shared library security isolation method and system |
| US10908948B2 (en) * | 2018-04-04 | 2021-02-02 | Vmware, Inc | Multiple application instances in operating systems that utilize a single process for application execution |
| CN109325345B (en) * | 2018-09-21 | 2022-10-28 | 百度在线网络技术(北京)有限公司 | Method and apparatus for running third party code in a sandbox environment |
| US10942945B2 (en) * | 2018-10-19 | 2021-03-09 | Oracle International Corporation | Isolated hierarchical runtime environments for multi-tenant databases |
| CN110324486A (en) * | 2019-04-25 | 2019-10-11 | 维沃移动通信有限公司 | A kind of application control method and terminal |
| US11321101B2 (en) * | 2019-07-10 | 2022-05-03 | Vmware, Inc. | Deployment and isolation of plugins in a virtualized computing environment |
| EP3786826B1 (en) * | 2019-08-30 | 2025-09-17 | Barclays Execution Services Limited | Secure validation pipeline in a third party cloud environment |
| US11886587B2 (en) | 2020-10-13 | 2024-01-30 | Kyndryl, Inc | Malware detection by distributed telemetry data analysis |
| US11487870B1 (en) * | 2021-04-30 | 2022-11-01 | Snowflake Inc. | Logging from user-defined functions |
| CN113486331A (en) * | 2021-07-21 | 2021-10-08 | 维沃移动通信(杭州)有限公司 | API call request processing method and device, electronic equipment and readable storage medium |
| CN113656092B (en) * | 2021-07-29 | 2024-04-19 | 浙江中控信息产业股份有限公司 | Plug-in-based SCADA system driving protocol efficient management method |
| US12050708B2 (en) | 2022-03-11 | 2024-07-30 | Oracle International Corporation | Cardinal method for hierarchical phased secure access to system entities in isolated multi-tenant database for autonomous cloud environments |
| US12045335B2 (en) * | 2022-03-29 | 2024-07-23 | International Business Machines Corporation | Software discovery within software packaging and deployment systems |
| CN119577740B (en) * | 2024-11-13 | 2025-09-12 | 中国人民解放军国防科技大学 | A secure isolation and integration method and device for Web application plug-ins |
Family Cites Families (49)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5974549A (en) * | 1997-03-27 | 1999-10-26 | Soliton Ltd. | Security monitor |
| US6167522A (en) * | 1997-04-01 | 2000-12-26 | Sun Microsystems, Inc. | Method and apparatus for providing security for servers executing application programs received via a network |
| US6275938B1 (en) | 1997-08-28 | 2001-08-14 | Microsoft Corporation | Security enhancement for untrusted executable code |
| US6836888B1 (en) | 2000-03-17 | 2004-12-28 | Lucent Technologies Inc. | System for reverse sandboxing |
| GB0007063D0 (en) * | 2000-03-23 | 2000-05-10 | Simsci Limited | Mulitvariate statistical process monitors |
| US7461148B1 (en) | 2001-02-16 | 2008-12-02 | Swsoft Holdings, Ltd. | Virtual private server with isolation of system components |
| EP1233333A1 (en) | 2001-02-19 | 2002-08-21 | Hewlett-Packard Company | Process for executing a downloadable service receiving restrictive access rights to al least one profile file |
| US7392546B2 (en) * | 2001-06-11 | 2008-06-24 | Bea Systems, Inc. | System and method for server security and entitlement processing |
| US7228551B2 (en) * | 2001-06-11 | 2007-06-05 | Microsoft Corporation | Web garden application pools having a plurality of user-mode web applications |
| DE50100101D1 (en) | 2001-06-26 | 2003-03-13 | Aladdin Knowledge Systems Gmbh | Method for expanding an application to be installed by means of an installation program by a function and computer program product |
| EP1468361A1 (en) * | 2001-12-19 | 2004-10-20 | Netuitive Inc. | Method and system for analyzing and predicting the behavior of systems |
| CA2471855C (en) | 2002-01-11 | 2013-03-19 | Akamai Technologies, Inc. | Java application framework for use in a content delivery network (cdn) |
| US20040123117A1 (en) * | 2002-12-18 | 2004-06-24 | Symantec Corporation | Validation for behavior-blocking system |
| US7493614B2 (en) | 2003-03-31 | 2009-02-17 | Microsoft Corporation | System architecture and related methods for dynamically adding software components to extend functionality of system processes |
| US10110632B2 (en) * | 2003-03-31 | 2018-10-23 | Intel Corporation | Methods and systems for managing security policies |
| US7508532B2 (en) | 2003-05-20 | 2009-03-24 | Microsoft Corporation | Method and system for sandboxing printer drivers |
| US7415703B2 (en) * | 2003-09-25 | 2008-08-19 | International Business Machines Corporation | Loading software on a plurality of processors |
| US7444678B2 (en) * | 2003-10-28 | 2008-10-28 | Aol Llc | Securing resources from untrusted scripts behind firewalls |
| US20050177635A1 (en) * | 2003-12-18 | 2005-08-11 | Roland Schmidt | System and method for allocating server resources |
| US7490268B2 (en) | 2004-06-01 | 2009-02-10 | The Trustees Of Columbia University In The City Of New York | Methods and systems for repairing applications |
| US7908653B2 (en) | 2004-06-29 | 2011-03-15 | Intel Corporation | Method of improving computer security through sandboxing |
| US7630313B2 (en) * | 2004-09-30 | 2009-12-08 | Alcatel-Lucent Usa Inc. | Scheduled determination of network resource availability |
| US7680758B2 (en) | 2004-09-30 | 2010-03-16 | Citrix Systems, Inc. | Method and apparatus for isolating execution of software applications |
| US7519809B2 (en) | 2005-04-07 | 2009-04-14 | International Business Machines Corporation | Operating system-wide sandboxing via switchable user skins |
| US20070118609A1 (en) | 2005-11-23 | 2007-05-24 | France Telecom | Distributed computing architecture and associated method of providing a portable user environment |
| US7941813B1 (en) | 2006-02-17 | 2011-05-10 | Parallels Holdings, Ltd. | System and method for using virtual machine for driver installation sandbox |
| WO2007100915A2 (en) * | 2006-02-28 | 2007-09-07 | The Trustees Of Columbia University In The City Of New York | Systems, methods, and media for outputting data based on anomaly detection |
| US7849451B2 (en) | 2006-03-02 | 2010-12-07 | Oracle America Inc. | Dynamic delegation chain for runtime adaptation of a code unit to an environment |
| US7725922B2 (en) | 2006-03-21 | 2010-05-25 | Novell, Inc. | System and method for using sandboxes in a managed shell |
| US8151323B2 (en) | 2006-04-12 | 2012-04-03 | Citrix Systems, Inc. | Systems and methods for providing levels of access and action control via an SSL VPN appliance |
| US7747785B2 (en) | 2006-04-14 | 2010-06-29 | Microsoft Corporation | Instant messaging plug-ins |
| US7979891B2 (en) | 2006-05-09 | 2011-07-12 | Oracle International Corporation | Method and system for securing execution of untrusted applications |
| US20080016339A1 (en) | 2006-06-29 | 2008-01-17 | Jayant Shukla | Application Sandbox to Detect, Remove, and Prevent Malware |
| US8656461B2 (en) * | 2006-07-28 | 2014-02-18 | Microsoft Corporation | Copy-paste trust system |
| US20080070665A1 (en) | 2006-09-19 | 2008-03-20 | Cyberscan Technology, Inc. | Regulated gaming - compartmented freelance code |
| US7845006B2 (en) * | 2007-01-23 | 2010-11-30 | International Business Machines Corporation | Mitigating malicious exploitation of a vulnerability in a software application by selectively trapping execution along a code path |
| US8146109B2 (en) * | 2007-02-15 | 2012-03-27 | Microsoft Corporation | Version resiliency for a host application and custom code |
| JP5081480B2 (en) * | 2007-03-28 | 2012-11-28 | 株式会社エヌ・ティ・ティ・ドコモ | Software behavior modeling device, software behavior modeling method, software behavior verification device, and software behavior verification method |
| US7899762B2 (en) * | 2007-05-17 | 2011-03-01 | International Business Machines Corporation | Apparatus, method, and computer program product providing improved identification of suspect entries in transaction data |
| US20090049547A1 (en) * | 2007-08-13 | 2009-02-19 | Yuan Fan | System for real-time intrusion detection of SQL injection web attacks |
| US8316101B2 (en) * | 2008-03-15 | 2012-11-20 | Microsoft Corporation | Resource management system for hosting of user solutions |
| US8424082B2 (en) | 2008-05-08 | 2013-04-16 | Google Inc. | Safely executing an untrusted native code module on a computing device |
| US20090293121A1 (en) * | 2008-05-21 | 2009-11-26 | Bigus Joseph P | Deviation detection of usage patterns of computer resources |
| US8214364B2 (en) * | 2008-05-21 | 2012-07-03 | International Business Machines Corporation | Modeling user access to computer resources |
| US9098698B2 (en) * | 2008-09-12 | 2015-08-04 | George Mason Research Foundation, Inc. | Methods and apparatus for application isolation |
| US8745361B2 (en) | 2008-12-02 | 2014-06-03 | Microsoft Corporation | Sandboxed execution of plug-ins |
| US9003517B2 (en) | 2009-10-28 | 2015-04-07 | Microsoft Technology Licensing, Llc | Isolation and presentation of untrusted data |
| US8621619B2 (en) | 2009-12-03 | 2013-12-31 | Google Inc. | Dynamic code insertion for static analysis based sandboxes |
| US8479286B2 (en) | 2009-12-15 | 2013-07-02 | Mcafee, Inc. | Systems and methods for behavioral sandboxing |
-
2008
- 2008-12-02 US US12/326,114 patent/US8745361B2/en active Active
-
2009
- 2009-11-02 KR KR1020117012044A patent/KR101652135B1/en not_active Expired - Fee Related
- 2009-11-02 BR BRPI0920054A patent/BRPI0920054A2/en not_active Application Discontinuation
- 2009-11-02 RU RU2011122280/08A patent/RU2011122280A/en not_active Application Discontinuation
- 2009-11-02 JP JP2011539542A patent/JP2012510679A/en not_active Withdrawn
- 2009-11-02 AU AU2009322881A patent/AU2009322881B2/en not_active Ceased
- 2009-11-02 MX MX2011005834A patent/MX2011005834A/en active IP Right Grant
- 2009-11-02 CA CA2742121A patent/CA2742121A1/en not_active Abandoned
- 2009-11-02 EP EP09830799A patent/EP2356578A4/en not_active Withdrawn
- 2009-11-02 CN CN200980149127.7A patent/CN102232217B/en not_active Expired - Fee Related
- 2009-11-02 WO PCT/US2009/062922 patent/WO2010065222A1/en not_active Ceased
-
2011
- 2011-04-14 IL IL212332A patent/IL212332A0/en unknown
-
2014
- 2014-05-08 US US14/273,481 patent/US9705905B2/en not_active Expired - Fee Related
-
2017
- 2017-06-06 US US15/615,411 patent/US10542022B2/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| EP2356578A4 (en) | 2012-09-05 |
| CA2742121A1 (en) | 2010-06-10 |
| RU2011122280A (en) | 2012-12-10 |
| MX2011005834A (en) | 2011-06-21 |
| US8745361B2 (en) | 2014-06-03 |
| CN102232217A (en) | 2011-11-02 |
| US20140245437A1 (en) | 2014-08-28 |
| US9705905B2 (en) | 2017-07-11 |
| IL212332A0 (en) | 2011-06-30 |
| US20100138639A1 (en) | 2010-06-03 |
| AU2009322881B2 (en) | 2014-07-24 |
| KR20110093816A (en) | 2011-08-18 |
| AU2009322881A1 (en) | 2010-06-10 |
| WO2010065222A1 (en) | 2010-06-10 |
| JP2012510679A (en) | 2012-05-10 |
| US10542022B2 (en) | 2020-01-21 |
| KR101652135B1 (en) | 2016-08-29 |
| EP2356578A1 (en) | 2011-08-17 |
| CN102232217B (en) | 2015-02-04 |
| US20180027007A1 (en) | 2018-01-25 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| BRPI0920054A2 (en) | safe mode execution of plug-ins | |
| BRPI0920498A2 (en) | method of treating a condition in a subject | |
| PL2350096T3 (en) | METHODS OF TREATMENT OF HEPATIC ENCEPHALOPATHY | |
| HRP20151000T8 (en) | ANTIVIRUS COMPOUNDS | |
| BRPI0910854A2 (en) | treatment methods | |
| EP2331264A4 (en) | CENTRIFUGE | |
| BRDI7005840S (en) | CONFIGURATION APPLIED AT LEVEL | |
| BRPI0920932A2 (en) | centrifuge | |
| CU23884B1 (en) | DERIVATIVES OF DIBENZOTIAZEPINA | |
| EP2242714A4 (en) | PROTECTION OF APPLICATION | |
| FR2930723B1 (en) | ORTHESE OF ANKLE | |
| FIU20080367U0 (en) | locking assurance | |
| IT1391542B1 (en) | SAFE | |
| ES1068411Y (en) | SAFETY LOCK | |
| UA17850S (en) | BUS IS MEMBERS | |
| FI20080500A0 (en) | Orientation of MSM fibers | |
| UA19085S (en) | BUS | |
| ES1068727Y (en) | ANTI SLIDING OF MONOPATIN | |
| CN301065080S (en) | Fingerprint safe (JZT-521-AG) | |
| UA17396S (en) | QUARTZ IRRADIATOR | |
| FI8089U1 (en) | Ice-drill and its part | |
| FIU20080295U0 (en) | Door | |
| TH102248B (en) | Door | |
| UA17514S (en) | DOOR | |
| UA17810S (en) | DOOR |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| B11A | Dismissal acc. art.33 of ipl - examination not requested within 36 months of filing | ||
| B11Y | Definitive dismissal - extension of time limit for request of examination expired [chapter 11.1.1 patent gazette] |